Australian CEOs Struggling to Face Cyber Risk Realities

Australian CEOs Struggling to Face Cyber Risk Realities

Image: ImageFlow/Adobe Stock Fear and the more technical aspects of cybersecurity are still stopping Australian CEOs from engaging more deeply with cybersecurity risks, despite a string of high-profile cyberattacks that have hit Australian brands, including Optus and Medibank and millions of their customers. New research from consulting firm Accenture found that only one in five (19%) of Australian CEOs are currently dedicating board meetings to discussing cybersecurity issues, while 34% think cybersecurity isn’t a strategic…

Read More

How to communicate AI cyber risk to the C-suite

How to communicate AI cyber risk to the C-suite

How to communicate AI cyber risk to the C-suite | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Connected Medical Devices—the Next Target for Ransomware Attacks | Healthcare IT Today

Connected Medical Devices—the Next Target for Ransomware Attacks | Healthcare IT Today

The following is a guest article by Ryan Witt, Healthcare Cybersecurity Leader at Proofpoint The Internet of Medical Things, or IoMT, is a deep web of interconnected devices that increasingly plays a vital role in care delivery. Unfortunately, these devices have also significantly enhanced healthcare’s cyber risk, and security researchers have raised alarms about the vulnerabilities of these devices for more than a decade. While we haven’t seen threat actors widely exploiting the vulnerabilities in…

Read More

Managing cyber risks while company scales

Managing cyber risks while company scales

Managing cyber risks while company scales | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Healthcare workers remain on the front line: Now against cyber threats

Healthcare workers remain on the front line: Now against cyber threats

Healthcare workers remain on the front line: Now against cyber threats | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

4 ways organizations fail to address cybersecurity risk

4 ways organizations fail to address cybersecurity risk

4 ways organizations fail to address cybersecurity risk | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Reducing cybersecurity risk for franchise businesses

Reducing cybersecurity risk for franchise businesses

Reducing cybersecurity risk for franchise businesses | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Jeffrey Aguilar named Los Angeles County CISO

Jeffrey Aguilar named Los Angeles County CISO

<!– Jeffrey Aguilar named Los Angeles County CISO | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Stanley Lowe named CISO at Synchronoss Technologies

Stanley Lowe named CISO at Synchronoss Technologies

Stanley Lowe named CISO at Synchronoss Technologies | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Six ways to reduce cyber risk in the C-suite

Six ways to reduce cyber risk in the C-suite

Six ways to reduce cyber risk in the C-suite | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More
1 2